It enables an optimal path for the L2VPN packet content to follow through the MPLS backbone.

It carries Layer 2 payload-specific information.

Answer: A,C,E,F

Question No: 72

When configuring class-based WRED on Cisco routers, which WRED parameter is not user configurable on a Cisco IOS XR but is user configurable on a Cisco IOS and IOS XE?

the ingress or egress direction where the class-based WRED policy will be applied

the maximum threshold

the minimum threshold

the mark probability denominator

Answer: D Explanation:

Comparison of Cisco IOS QoS and Cisco IOS-XR QoS

The Cisco IOS-XR software implementation of QoS is basically the same as the QoS implementation on Cisco

IOS software, with the following exceptions:

鈥n Cisco IOS-XR software, the bandwidth command can be configured only in egress policies.

鈥he following changes have been made to the class-map command on Cisco IOS-XR software:

-Supports 4K per logical router.

-Maximum number of match criteria configurable in one class map is eight.

鈥hen a class is marked as high priority using the priority command on Cisco IOS-XR software, we recommend that you configure a policer to limit the priority traffic. Limiting the priority traffic will ensure that the priority traffic does not starve all of the other traffic on the line card. Use the police command to explicitly configure the policer.

鈥n Cisco IO-XR software, only one conform-action, exceed-action, or violate-action command can be configured at a time. To configure traffic policing, use the police command.

鈥n Cisco IOS-XR software, policy modifications cannot be made on existing policies. Use the policy-map command to remove the policy from all attached interfaces, delete the policy map, and redefine a new policy.

鈥hen configuring a policy map on Cisco IOS-XR software, the maximum number of classes configurable in one policy map is 16, which includes both Level 1 and Level 2 classes. To configure a policy map, use the policy-map command.

鈥hen WRED is configured on Cisco IOS-XR software, the mark probability in the random- detect command is not configurable-it is always set to 1.

鈥hen the random-detect exp command is used on Cisco IOS-XR software, the exponential weighting constant is not configurable and will be programmed automatically by Cisco IOS-XR software.

鈥hen access control lists (ACLs) are used in QoS class maps, the underlying deny or permit actions associated with access control entries (ACEs) are ignored. ACEs are used as a classification mechanism in order to provide appropriate QoS behavior as specified in class maps. Use ACLs that include ACEs with permit actions only.

Question No: 73

Which two statements are correct in describing ISP environments that are running IP/MPLS in the core network? (Choose two.)

On the PE routers, each BGP route must use a unique label to reach the BGP next hop.

The BGP next hops point to the PE routers, and only the PE routers are required to run BGP.

A full mesh of IBGP sessions are required between all of the PE and P routers to ensure proper packets forwarding.

The PE and P routers run LDP to learn the labels for reaching the BGP next-hop addresses.

Answer: B,D

Question No: 74

Which three steps are required to configure QPPB on Cisco IOS XR routers? (Choose three.)

Apply a QPPB route policy to the BGP process using the table-policy command

Apply a QPPB route policy to the BGP neighbor using the route-policy command

Define a QPPB route policy to match the customer routes, then set the IP precedence or qos-group

Define a QPPB route policy to match the customer IP precedence or qos-group markings, then set the BGP community

QoS Policy Propagation via BGP (QPPB), is a mechanism that allows propagation of quality of service (QoS) policy and classification by the sending party based on access lists, community lists and autonomous system paths in the Border Gateway Protocol (BGP), thus helping to classify based on destination instead of source address.

Question No: 75

On Cisco routers, which three methods can be used to map traffic into the MPLS traffic engineering tunnel? (Choose three.)

on-demand routing

static routing

optimized edge routing

policy-based routing

autoroute

Answer: B,D,E

Question No: 76

What are the four fields inside the MPLS shim header? (Choose four.)

EXP

TTL

Version

S

Length

Label

Type

FCS

Answer: A,B,D,F

Question No: 77

Which two network devices are trusted endpoints in a network? (Choose two.)

video endpoint

PC

wireless clients

IP phone

Answer: A,D

Question No: 78

Which affinity value will be matched by the affinity bit mask of the affinity 0xFF00000A mask 0xFFFF000F command?

0xFFFF000A

0xFF00EEEA C. 0xFF000000 D. 0x00000000 E. 0x11110001

Answer: B Explanation:

0xFF00000A 11111111000000000000000000001010

0xFFFF000F 11111111111111110000000000001111

0xFF00EEEA 11111111000000001110111011101010

Question No: 79

Which method is used to mark traffic matched by class-map MY_CLASS as Expedited Forwarding?

set ip dscp cs7

set dscp cs7

set dscp 46

set dscp 45

Answer: C

Question No: 80

Which Cisco IOS XR command should be used to identify if MPLS TE FRR is enabled?

show mpls traffic-eng tunnel lt;tunnel#gt;

show mpls frr

show mpls traffic-eng protection

show mpls protection

show mpls fast-reroute

Answer: A Explanation:

The MPLS Traffic Engineering (TE)-Fast Reroute (FRR) Link and Node Protection feature provides link protection (backup tunnels that bypass only a single link of the label-switched path (LSP)), node protection (backup tunnels that bypass next-hop nodes along LSPs), and the following FRR features: